http://www.washingtonpost.com/wp-dyn/content/article/2005/06/25/AR2005062501284.html By Ariana Eunjung Cha Washington Post Staff Writer June 26, 2005 DENVER -- E-mails were flooding in from all over the country. Something strange was going on with the Internet, alarmed computer users wrote. Google, eBay and other big sites had suddenly disappeared. Kyle Haugsness scanned the reports and entered crisis mode. Part of the Internet was broken. For the 76th time that week. Haugsness was on duty for the Internet Storm Center, the closest thing to a 911 emergency-response system for the global network. He and a few colleagues began investigating and discovered that a hacker had taken advantage of yet another security hole. As many as 1,000 companies had effectively had their connections "poisoned," so when their employees typed in legitimate addresses they were taken to bogus Web destinations. Haugsness wrote up an alert and a suggested solution, and posted it on the Web. Then, Haugsness turned back to his inbox. In the few hours he had spent sleuthing that March day, several dozen e-mails detailing other suspected issues had piled up. Built by academics when everyone online was assumed to be a "good citizen," the Internet today is buckling under the weight of what is estimated to be nearly a billion diverse users surfing, racing, and tripping all over the network. Hackers, viruses, worms, spam, spyware and phishing sites have proliferated to the point where it's nearly impossible for most computer users to go online without falling victim to them. Last year, the Carnegie Mellon University CERT Coordination Center logged 3,780 new computer security vulnerabilities, compared with 1,090 in 2000 and 171 in 1995. Computer security firm Symantec Corp. over the past decade has catalogued 11,000 vulnerabilities in 20,000 technologies, affecting 2,000 vendors. "I'm very pessimistic about it all," said Haugsness, who has worked for the storm center for two years. "There are huge problems and outages all the time, and I see things getting worse." Originally developed by the Defense Department, the Internet is now a global electronic communications network made up of hundreds of millions of computers, servers and other devices run by various governments, academic institutions, companies and individuals. Because no one entity owns it, the network depends on goodwill to function smoothly. The Internet has become so huge -- and so misused -- that some worry that its power to improve society has been undermined. Now a movement is gathering steam to upgrade the network, to create an Internet 2.0. How, or even if, that could be done is a subject of much debate. But experts are increasingly convinced that the Internet's potential will never be met unless it's reinvented. "The Internet is stuck in the flower-power days of the '60s during which people thought the world would be beautiful if you are just nice," said Karl Auerbach, a former Cisco Systems Inc. computer scientist who volunteers with several engineering groups trying to improve the Internet. Many of the bugs in the Internet are part of its top layers of software, the jazzy, graphics-heavy, shrink-wrapped programs that come loaded on new computers or sold in retail stores. But some of the most critical issues were built into the network's core design, written decades ago and invisible to the average user. For example, a way to verify the identity of a sender of e-mail or other communications is just beginning to become available, meaning that many criminals roam the network with relative anonymity. And the system that matches addresses to Web sites is vulnerable to hackers, redirecting users to sites they never wanted to visit. Technological solutions for many of those problems have existed for years, but it's been difficult to build a consensus to implement them. Arguments about global politics, potential profits and ownership of intellectual property have plagued groups trying to fix things. "The problem with the Internet is that anything you do with it now is worth a lot of money. It's not just about science anymore. It's about who gets to reap the rewards to bringing safe technologies to people," said Daniel C. Lynch, 63, who as an engineer at the Stanford Research Institute and at the University of Southern California in the 1970s helped develop the Internet's framework. As the number of users exploded to more than 429 million in 2000 from 45 million in 1995, Lynch remembered watching in horror as hackers defaced popular Web sites and shady marketers began to bombard people's e-mail inboxes with so much spam that real messages couldn't get through. When the Internet's founding fathers were designing the network in the 1960s and 1970s, they thought a lot about how the network would survive attacks from the outside -- threats like tornados, hurricanes, even nuclear war. What they didn't spend much time thinking about was internal sabotage. Only several hundred people had access to the first version of the Internet and most knew each other well. "We were all pals," Lynch said. "So we just built it without security. And the darn thing got out of the barn." Years passed before the Internet's founders realized what they had created. "All this was an experiment. We were trying to figure out whether this technology would work. We weren't anticipating this would become the telecommunications network of the 21st century," said Vinton G. Cerf, 62, who with fellow scientist Robert T. Kahn, 66, helped draft the blueprints for the network while it was still a Defense Department research project. Even as he marveled at the wonders of instant messaging, Napster and other revolutionary tools that would not have been possible without the Internet, Leonard Kleinrock, 71, a professor at the University of California at Los Angeles who is credited with sending the first message -- "lo," for "log on" -- from one computer to another in 1969, began to see the Internet's dark side. "Right now the Internet is running amok and we are in a very difficult period," Kleinrock said. Some technologists have said the Internet or parts of it are so far gone that it should be rebuilt from scratch, and over the past decade there have been several attempts to do so. But most now agree that the network has become too big and unruly for a complete overhaul. For now groups are working on what are essentially bandages for the network. Today, a complicated bureaucracy of groups known by their abbreviations help govern the network: the IETF (the Internet Engineering Task Force, which comes up with the technical standards), ICANN (the Internet Corporation for Assigned Names and Numbers, which manages the naming system for Web sites) and the W3C (the World Wide Web Consortium, which develops technologies for the Web). But their power is limited and their legal standing murky. Some have recently argued that the United Nations should take over some regulatory functions. Firms have set up their own standards groups to suit their own interests. The one thing everyone seems to agree on is that security must be the priority when it comes to the next generation Internet. Major companies are promoting technology that will give recipients of e-mail "return addresses," or a better way of ensuring that senders are who they say they are, though the companies disagree on whose technology should be used. A group of scientists from the Internet Engineering Task Force, perhaps the most important standards-making body for the network, are working on a way to better collect and share information on computer intrusions. Internet2, a consortium of mostly academic institutions that has built a screaming-fast network separate from the public Internet, is testing a technology that allows users to identify themselves as belonging to some sort of group. Douglas E. Van Houweling, president of Internet2 and a professor at the University of Michigan, thinks the system could be used to limit access without using passwords to, say, chat rooms for women with children on a certain soccer team, or to subscribers of certain magazines or newspapers. "You've heard the saying that on the Internet nobody knows you're a dog, and that's of course the problem," Van Houweling said. "Authentication will allow communities to form where people are known and therefore can be trusted." But there's a trade-off for such security. The network becomes balkanized, with more parts of it closed to most people. Auerbach, who has been involved with ICANN and the IETF, said more security raises the "specter of central authorities." Lynch believes the Internet will never truly be secure, though, because of the diversity of software and devices that run on it. If one has a flaw, others are vulnerable. For years computer designers have tried to build a machine that lives up to the "orange book," a specification written by technologists at the predecessor to the National Institute of Standards and Technology. It describes a bug-free, completely secure computer that has to be built in a clean room with designers who have gone through extensive background checks and are not allowed to communicate with anyone. "There have been a few computer systems built like this for the military and they vanish, just vanish. Nobody talks about them anymore," Lynch said. "They have been created, but for the average person they may as well not exist." Until that perfect machine is built for consumers, it will be up to people like Haugsness at the Internet Storm Center to keep the network up and running. The center is operated by the SANS Institute, a Bethesda-based nonprofit dedicated to computer security. But most of its work is done by an eclectic group of volunteers who sign on remotely from around the world, including a former National Security Council staff member and a grandmother in Iowa. Haugsness is in his late twenties and is an avid snowboarder and mountain biker. One Sunday afternoon this month, Haugsness was at his company's office checking the storm center reports. One person said he had found a new variant of a program that allowed hackers to take over a computer by creating a "back door" through holes in its security system. There were also complaints about a few phishing e-mails that tried to trick people into giving up their personal information. Internet traffic patterns worldwide seemed fine -- only a few sections had congestion that would qualify as serious, or "red." Nothing "super bad" so far, Haugsness concluded. All in all, only about a half-dozen documented problems. That might have been considered a disaster a decade ago. But it was a pretty good day for the Internet in 2005. © 2005 The Washington Post Company _________________________________________ Attend the Black Hat Briefings and Training, Las Vegas July 23-28 - 2,000+ international security experts, 10 tracks, no vendor pitches. www.blackhat.com
This archive was generated by hypermail 2.1.3 : Tue Jun 28 2005 - 00:34:19 PDT